Bibliography: Difference between revisions

From International cyber law: interactive toolkit
Jump to navigation Jump to search
No edit summary
No edit summary
Line 45: Line 45:
 
== Journal articles ==
 
== Journal articles ==
 
* Steven Bellovin, Susan Landau and Herbert Lin, ‘[https://academic.oup.com/cybersecurity/article/3/1/59/3097802 Limiting the Undesired Impact of Cyber Weapons: Technical Requirements and Policy Implications]’ (2017) 3(1) Journal of Cybersecurity 59.
 
* Steven Bellovin, Susan Landau and Herbert Lin, ‘[https://academic.oup.com/cybersecurity/article/3/1/59/3097802 Limiting the Undesired Impact of Cyber Weapons: Technical Requirements and Policy Implications]’ (2017) 3(1) Journal of Cybersecurity 59.
  +
* Jeffrey T Biller and Michael N Schmitt, ‘[https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?article=2462&context=ils Classification of Cyber Capabilities and Operations as Weapons, Means, or Methods of Warfare]’ (2019) 95 Int’l L Stud 179.
*Duncan Blake and Joseph Imburgia, ‘“[https://ssrn.com/abstract=1850831 Bloodless Weapons”? The Need to Conduct Legal Review of Certain Capabilities and the Implications of Defining Them as “Weapons]”’, (2010) 66 Air Force Law Review 157.
+
* Duncan Blake and Joseph Imburgia, ‘“[https://ssrn.com/abstract=1850831 Bloodless Weapons”? The Need to Conduct Legal Review of Certain Capabilities and the Implications of Defining Them as “Weapons]”’, (2010) 66 Air Force Law Review 157.
*Vincent Boulanin and Maaike Verbruggen, ''[https://www.sipri.org/sites/default/files/2017-12/article_36_report_1712.pdf Article 36 Reviews: Dealing with the Challenges Posed by Emerging Technologies]'' [2017] SIPRI.
+
* Vincent Boulanin and Maaike Verbruggen, ''[https://www.sipri.org/sites/default/files/2017-12/article_36_report_1712.pdf Article 36 Reviews: Dealing with the Challenges Posed by Emerging Technologies]'' [2017] SIPRI.
 
*Mark Bromley, ‘[https://www.sipri.org/sites/default/files/2018-01/sipri1712_bromley.pdf Export Controls, Human Security and Cyber-Surveillance Technology: Examining the Proposed Changes to the EU Dual-use Regulation]’ [2017] SIPRI.
 
*Mark Bromley, ‘[https://www.sipri.org/sites/default/files/2018-01/sipri1712_bromley.pdf Export Controls, Human Security and Cyber-Surveillance Technology: Examining the Proposed Changes to the EU Dual-use Regulation]’ [2017] SIPRI.
 
*Gary Brown and Andrew Metcalf, ‘[http://jnslp.com/wp-content/uploads/2014/02/Easier-Said-than-Done.pdf Easier Said Than Done: Legal Reviews of Cyber Weapons]’ (2014) 7 Journal of National Security Law & Policy 115.
 
*Gary Brown and Andrew Metcalf, ‘[http://jnslp.com/wp-content/uploads/2014/02/Easier-Said-than-Done.pdf Easier Said Than Done: Legal Reviews of Cyber Weapons]’ (2014) 7 Journal of National Security Law & Policy 115.
Line 67: Line 68:
 
*Kubo Mačák, ‘[https://doi.org/10.1017/S0922156517000358 From Cyber Norms to Cyber Rules: Re-engaging States as Law-makers]’ (2017) 30 LJIL 877.
 
*Kubo Mačák, ‘[https://doi.org/10.1017/S0922156517000358 From Cyber Norms to Cyber Rules: Re-engaging States as Law-makers]’ (2017) 30 LJIL 877.
 
*Kubo Mačák, ‘[https://doi.org/10.1017/S0021223714000260 Military Objectives 2.0: The Case for Interpreting Computer Data as Objects under International Humanitarian Law]’ (2015) 48 Isr L Rev 55.
 
*Kubo Mačák, ‘[https://doi.org/10.1017/S0021223714000260 Military Objectives 2.0: The Case for Interpreting Computer Data as Objects under International Humanitarian Law]’ (2015) 48 Isr L Rev 55.
 
* Peter Margulies, '[https://law.unimelb.edu.au/__data/assets/pdf_file/0006/1687488/05Margulies-Depaginated.pdf Sovereignty and Cyber Attacks: Technology's Challenge to the Law of State Responsibility]' (2013) 14 MJIL.
*
 
*Peter Margulies, '[https://law.unimelb.edu.au/__data/assets/pdf_file/0006/1687488/05Margulies-Depaginated.pdf Sovereignty and Cyber Attacks: Technology's Challenge to the Law of State Responsibility]' (2013) 14 MJIL.
 
 
*Marko Milanovic, ‘[http://www.harvardilj.org/wp-content/uploads/561Milanovic.pdf Human Rights Treaties and Foreign Surveillance: Privacy in the Digital Age]’ (2015) 56/1 Harv Int'l LJ.
 
*Marko Milanovic, ‘[http://www.harvardilj.org/wp-content/uploads/561Milanovic.pdf Human Rights Treaties and Foreign Surveillance: Privacy in the Digital Age]’ (2015) 56/1 Harv Int'l LJ.
 
*Noam Neuman, ‘Challenges in the Interpretation and Application of the Principle of Distinction During Ground Operations in Urban Areas’ (2018) 51 VJTL 807.
 
*Noam Neuman, ‘Challenges in the Interpretation and Application of the Principle of Distinction During Ground Operations in Urban Areas’ (2018) 51 VJTL 807.

Revision as of 12:36, 3 July 2019

Bibliography.jpg

Books and monographs

Contributions to edited collections

  • Russell Buchan, ‘The International Legal Regulation of State-Sponsored Cyber Espionage’ (2016) in Anna-Maria Osula and Henry Rõigas (eds) International Cyber Norms: Legal, Policy & Industry Perspectives (NATO CCD COE Publications, Tallinn 2016).
  • Lindsey Cameron et al, ‘Article 3: Conflicts Not of an International Character’ in ICRC (ed), Commentary on the First Geneva Convention (CUP 2016).
  • Andrew Clapham, ‘Concept of International Armed Conflict’ in Andrew Clapham, Paola Gaeta, and Marco Sassòli (eds), The 1949 Geneva Conventions: A Commentary (OUP 2015).
  • Jean D’Aspremont, ‘Persona Non Grata’, in Rüdiger Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008).
  • Oliver Dörr and Albrecht Randelzhofer, ‘Article 2(4)’ in Bruno Simma et al (eds), The Charter of the United Nations: A Commentary (OUP 2012).
  • Frederic Dopagne, ‘Sanctions and Countermeasures by International Organizations’, in Richard Collins and Nigel White (eds) International Organizations and the Idea of Autonomy (Routledge 2011).
  • Tristan Ferraro and Lindsey Cameron, ‘Article 2: Application of the Convention’, in ICRC (ed), Commentary on the First Geneva Convention (CUP 2016).
  • Robin Geiss and Henning Lahmann, ‘Freedom and Security in Cyberspace: Shifting the Focus Away from Military Responses Towards Non-Forcible Countermeasures and Collective Threat-Prevention’ in Katharina Ziolkowski (ed), Peacetime Regime for State Activities in Cyberspace (NATO CCD COE 2013).
  • Jan K Kleffner, ‘Scope of Application of Humanitarian Law’ in Dieter Fleck (ed), The Handbook of International Humanitarian Law (3rd edn, OUP 2013).
  • Franck Latty, ‘Actions and Omissions’ in James Crawford et al (eds), The Law of International Responsibility (OUP 2010).
  • Georg Nolte and Albrecht Randelzhofer, ‘Article 51’ in Bruno Simma et al (eds), The Charter of the United Nations: A Commentary (OUP 2012).
  • Anne Peters, ‘Article 25’ in Bruno Simma et al (eds), The Charter of the United Nations: A Commentary (3rd edn, OUP 2012).
  • Rüdiger Wolfrum, ‘Obligation of Result Versus Obligation of Conduct: Some Thoughts About the Implementation of International Obligations’ in Mahnoush H Arsanjani et al, Looking to the Future: Essays on International Law in Honor of Michael Reisman (Brill 2010).
  • Silja Vöneky, ‘Analogy in International Law’, in Rüdiger Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008).

Edited books and reference texts

Journal articles

International treaties, reports and other public documents

Blog posts and other online sources